HackDig : Dig high-quality web security articles for hacker

Microsoft confirmed it won’t fix kernel issue that could be exploited to evade antivirus

2017-09-09 05:30

A design flaw within the Windows kernel could be exploited by attackers to evade antivirus and stop them from recognizing malware.

A design flaw within the Windows kernel is the root cause for antivirus stopping from recognizing malware, and the bad news is that Microsoft won’t fix it because the tech giant doesn’t consider it as a security issue.

The vulnerability was discovered a few days ago by the security researcher Omri Misgav from enSilo , it affects the system call PsSetLoadImageNotifyRoutine that is still active in the latest builds of Microsoft OSs.

“During research into the Windows kernel, we came across an interesting issue with PsSetLoadImageNotifyRoutine which as its name implies, notifies of module loading.” Misgav wrote in a blog post.

“The thing is, after registering a notification routine for loaded PE images with the kernel the callback may receive invalid image names.” “This flaw exists in the most recent Windows 10 release and past versions of the OS, dating back to Windows 2000.”

Microsoft kernel issue PsSetLoadImageNotifyRoutine

PsSetLoadImageNotifyRoutine is used also by antivirus to check the presence of malware in memory, but the issue could be tricked to deceive the defense solutions.

“After digging into the matter, what started as a seemingly random issue proved to originate from a coding error in the Windows kernel itself.” continues the analysis.

“The thing is, after registering a notification routine for loaded PE images with the kernel, the callback may receive invalid image names. After digging into the matter, what started as a seemingly random issue proved to originate from a coding error in the Windows kernel itself.”

The mechanism notifies registered drivers when a PE image file has been loaded into virtual memory (kerneluser space).

The notification routine could be invoked in the following cases:

  • Loading drivers
  • Starting new processes
    • Process executable image
    • System DLL: ntdll.dll (2 different binaries for WoW64 processes)
  • Runtime loaded PE images – import table, LoadLibrary, LoadLibraryEx, NtMapViewOfSection.

The flaw could be exploited by malware to provide antivirus benign executables to inspect rather than their malicious code.

enSilo reported the issue to Microsoft and this is their reply:

“Our engineers reviewed the information and determined this does not pose a security threat and we do not plan to address it with a security update.”

Pierluigi Paganini

(Security Affairs – Microsoft, hacking)

The post Microsoft confirmed it won’t fix kernel issue that could be exploited to evade antivirus appeared first on Security Affairs.


Source: lmth.eussi-lenrek-tfosorcim/gnikcah/27826/sserpdrow/oc.sriaffaytiruces

“Microsoft confirmed it won’t fix kernel issue that could be exploited to evade antivirus”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud